www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

SIM Swapping: A New Cyber Attack via Your Mobile Phone

Dec 4, 2019 11:03:29 AM / by Eric Benda, CEO posted in Mobile Device Management (MDM), cybersecurity, SIM Swap Attack, SIM Swapping, SIM Swap

0 Comments

Don’t Use Your Cell for 2FA – And Other Precautions

We’re not kidding when we say that cyber threats are evolving at a crazy, rapid clip. In this post we’ll tell you about a relatively recent one called SIM Swapping that is quite troubling.

Read More

Recent NY SHIELD Act Beefs Up Cyber Security for State Citizens

Nov 26, 2019 8:30:00 AM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, legislature

0 Comments

What Businesses Everywhere Should Know About New NY Data Protection Law Compliance

New York state recently enacted a robust amendment to existing NY data protection law. Known as the NY SHIELD Security Act (Senate Bill S5575B), it applies to any company that has access to or stores personal or private customer or employee data of New York residents. By the way, SHIELD is an acronym for Stop Hacks and Improve Electronic Data.

Read More

Windows Autopilot Provides Improved Out-of-box Experience for Users

Nov 1, 2019 3:10:41 PM / by Eric Benda, CEO posted in Microsoft Security, Windows Autopilot, Device Configuration

0 Comments

Automated Device Configuration Solution Also Creates IT Department Efficiencies

One-by-one. One-at-a-time. That’s how we as an IT support outsource, as well as in-house IT departments have always configured new devices for company employees – or reconfigured devices for re-use by another employee. The result of manual device configuration has been a delay in getting new technology into the hands of employees – thus a delay in the potential productivity it adds.

Read More

Disinformation Campaigns Not Limited to Politics; Businesses Beware

Oct 28, 2019 8:45:00 AM / by Liege Payne, Director of Sales & Business Development posted in cyber security, Disinformation Campaign, Fake News Sites

0 Comments

‘Fake News’ Sites, Troll and Other Attacks Can Trash Reputations, Manipulate Stock Prices, More

Lately, not a day goes by when we don’t hear or see a reference to ‘Fake News’ – generally related to politics. We read about Russian, Irani and Chinese bots, trolls and ‘fake news’ sites spreading disinformation in efforts to influence elections and otherwise disrupt nation states. As unsettling as this truth of modern life may be, it’s equally disturbing that the same disinformation campaign tactics are being applied to the business community.

Read More

Password Security: New Rules, New Threats

Oct 1, 2019 10:16:53 AM / by Eric Benda, CEO posted in Security, cyber security, Password Security

0 Comments

Is There Such a Thing as a Secure Password?

October is Cyber Security Awareness Month – and we're glad that the subject gets this type of notice. This post is part of our ongoing effort to keep cyber security top of mind year-round.

Read More

Is Your Company Prepared for Cyber Warfare? It’s Here and There Are No Rules!

Aug 27, 2019 1:42:04 PM / by Eric Benda, CEO posted in Security, cyber security, Cyber Warfare

0 Comments

Why Cyber Warfare Should Be on Your Security Radar Screen

Here on the Next Level Network Blog, we’ve talked about many and varied cyber threats from online crooks out to separate you from your money or to access data that can help them steal from others. When a cyber attack comes from a nation state actor, however, the motivation is far different. Then it’s cyber warfare, intended to disrupt political and other systems in order to weaken or destroy another government. Cyber warfare isn’t a thing of the future. It’s here now. The time is now to talk about cyber warfare and security for your business.

Read More

Announcing a New eBook: 16 Essential Tips for Successful Technology Relocation

Aug 1, 2019 9:00:00 AM / by Eric Benda, CEO posted in Business Continuity Plan, Office Move, IT Relocation, Business Continuity

0 Comments

Business Continuity Management When You Move Offices; Download for Free

Lately, we’ve been helping at least one company per week with technology relocation as they move offices. Most, in line with some recent studies, are moving to accommodate growth. In fact, we are one of the companies we moved just a couple of weeks ago to accommodate our own growth. So, office technology relocation is top of mind for us in more ways than one.

Read More

Crypto Mining Tools Are Overtaking Ransomware Attacks as a Cyber Threat

Jul 10, 2019 1:16:39 PM / by Liege Payne, Director of Sales & Business Development posted in Ransomware, Soundshore Technology Group, Crypto Mining Tools

0 Comments

Longer-term Payoffs, Lower Tech Skill Requirements Motivating More Bad Actors

A new cyber threat – crypto mining – began in 2017, accelerated in 2018 and is exploding in 2019, overtaking ransomware attacks to become one of the most prolific threats out there. More correctly termed ‘crypto jacking’ when used for nefarious purposes, crypto mining, when used legally, is a part of the cryptocurrency ecosystem that helps to keep track of ‘blocks’ of cryptocurrency as they’re created. Legitimate crypto miners use crypto mining tools on their computers that may earn them a few pennies for their efforts to help maintain and/or increase the value of cryptocurrencies.

Read More

Announcing a Free Tool to Walk You Through the Steps to Business Continuity and Disaster Recovery

Jun 25, 2019 9:00:00 AM / by Eric Benda, CEO posted in Disaster Recovery, Business Continuity, DATTO

0 Comments

"The Ultimate Disaster Recovery Checklist" Offers a Rational Response to a Stressful Experience

We recently launched a free eBook on planning for business continuity and disaster recovery. Again in collaboration with our Disaster Recovery as a Service (DRaaS) solutions partner, DATTO, we’re announcing part two, "The Ultimate Disaster Recovery Checklist." Even if you have a plan in place, or are working on one, when disaster strikes, great stress is placed on the entire organization. It helps to have a handy tool like this checklist to help organize a rational response to what could be a chaotic and disarming experience.

Read More

Cyber Attacks on IoT Devices Are Rising

Jun 14, 2019 12:07:28 PM / by Eric Benda, CEO posted in cyber security, Soundshore Technology Group, IoT Cyber Attacks, SecureRF

0 Comments

Why More Secure Smart Devices Are Critical to Network Security

In recent years, there’s been a lot of attention on the Internet of Things (IoT). The IoT is revolutionizing many aspects of modern life, but it is also enabling unprecedented cyberattacks on IoT devices. It’s critical for businesses to understand how and why these attacks work, as well as why they must seek more secure smart devices to protect office network security. This is especially true of regulated industries including financial services and healthcare that are adopting IoT technologies to better serve their clients and patients. They must also deal with the downside.

According to its Wikipedia definition, IoT is the extension of Internet connectivity into physical devices and everyday objects. These devices can then communicate and interact with others over the Internet, and they can be remotely monitored and controlled. It’s easy to imagine how bad actors could exploit these factors to breach a smart home security system or to spy on an office conference room via a smart TV.

Read More